VYPR
Moderate severityNVD Advisory· Published Feb 22, 2024· Updated Mar 20, 2025

Apache Answer: Repeated submission at registration created duplicate users with the same name

CVE-2024-26578

Description

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Answer.This issue affects Apache Answer: through 1.2.1.

Repeated submission during registration resulted in the registration of the same user. When users register, if they rapidly submit multiple registrations using scripts, it can result in the creation of multiple user accounts simultaneously with the same name. Users are recommended to upgrade to version [1.2.5], which fixes the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Answer through 1.2.1 has a race condition allowing duplicate user registration via rapid submissions; fixed in 1.2.5.

Vulnerability

CVE-2024-26578 is a race condition vulnerability in Apache Answer up to version 1.2.1, arising from improper synchronization during the user registration process. When users register, the system does not properly lock shared resources, allowing concurrent registration requests to create multiple accounts with the same username if submissions are made rapidly [1][2].

Exploitation

An attacker can exploit this by scripting rapid registration requests to the same username. This does not require authentication or special privileges, only network access to the registration endpoint. The attacker can create many duplicate accounts, potentially filling the database with identical usernames [2].

Impact

Successful exploitation leads to multiple user accounts sharing the same name, which can cause confusion, disrupt normal user management, and potentially be used to bypass rate limits or impersonation controls. This could degrade the platform's trustworthiness and complicate moderation [1][2].

Mitigation

The vulnerability is fixed in Apache Answer version 1.2.5. Users are strongly recommended to upgrade to this version immediately. No workaround is mentioned [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/apache/incubator-answerGo
< 1.2.51.2.5

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.